The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the novel ideas on secret sharing were first proposed in 1979, a number of variants have been invented, based on these two schemes. The secret sharing schemes have selectively been applied to many distributed storage systems connected by both wired and wireless communication links for securely storing files. However, when gathering file fragments necessary to recover a file from network-based...
The dynamics of multi-agent in nature have been largely studied for a long time to investigate how the aggregation of agents can move smoothly in complex environments without collision. The main insights can be summarized such that the aggregated dynamics of animals and particles can be explained by an individual's simple rules. In a similar vein, we conjecture that such simple rules for vehicle maneuvering...
The arc fault circuit interrupter (AFCI) is expected to be one of the most essential components in smart grid systems for providing physical security and safety against electrical fire hazards caused by arc faults. As AFCIs are widely deployed as a part of mandatory installation requirements, a hierarchy consisting of multilevel AFCIs has been established, where a portable AFCI is connected serially...
Epidemic malicious codes including Internet worms and botnets have continuously evolved to be more intelligent and complicated. In particular, the recent distributed denial-of-service (DDoS) attack that occurred in United States and South Korea in July, 2009 gives an opportunity to reconsider the epidemic malicious code. Since automatic patching systems and intelligent intrusion detection and prevention...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.